Operation of the application
19
In order to create protection of Microsoft Exchange Server, installed on
the cluster, against malware and SPAM:
1. Install
the
Security Server
component on each node of the cluster.
The installation shall be performed from the distribution kit
individually for each server.
Specify a folder on a
local
disk of the server file system as
the installation folder.
Shared disks
should not be used for this purpose as when
the Microsoft Exchange Server application is moved to a dif-
ferent node of the cluster, the shared disk will be moved
along with the application.
2. Install
the
Management Console
on a computer within the
corporate network.
3. Create the list of managed servers by adding
all
cluster nodes as
servers (see section 4.3, page 30).
When adding managed servers and configuring connection
of Management Console to the Server, use the names of
physical
servers on which the Security Server is installed.
The use of a
virtual
Exchange server name may cause an
addressing error when the Microsoft Exchange Server is
moved to a different node of the cluster.
4. Connect the Management Console to the servers (see section 4.4,
page 31).
5. Configure the anti-virus protection system for each server using
identical
settings values taking into consideration the following:
•
As the backup storage folder, select a folder located on the
physical server where the Security Server component is
installed (see section 9.7, page 83).
•
As a folder to be used to store reports and logs, select folders
located on the physical server where the Security Server
component is installed (see section 12.1.2, page 107 and
section 13.2, page 114).
•
The list of unprotected storage areas on all servers must match
(see section 14.5, page 122).